John Breeden II

John Breeden II is an award-winning journalist and reviewer with over 20 years of experience covering technology. He is the CEO of the Tech Writers Bureau, a group that creates technological thought leadership content for organizations of all sizes.

REVIEW: Cyphort makes advanced threat protection easier than ever

REVIEW: Cyphort makes advanced threat protection easier than ever

Over the past few months, we’ve reviewed a variety of cutting-edge security tools that combat advanced persistent threats (APTs); everything from threat intelligence to virtual sandboxing to privileged identity management. And while...

Review: Stop insider attacks with these 6 powerful tools

Review: Stop insider attacks with these 6 powerful tools

For this review, we looked at BeyondTrust, Lieberman Software, NetIQ, CyberArk, Centrify and Viewfinity. This is still an evolving area, and companies are approach it from different perspectives. For that reason, this is not a...

6 super-defenses against super-user attacks

6 super-defenses against super-user attacks

Review: Privileged Identity Management from BeyondTrust, CyberArk, Lieberman Software, NetIQ, Centrify and Viewfinity.

REVIEW: Threat Intelligence could turn the tide against cybercriminals

REVIEW: Threat Intelligence could turn the tide against cybercriminals

We review security products from ThreatConnect, ThreatStream, Soltra, Arbor Networks and iSIGHT Partners

Review: Breakthroughs in endpoint security

Review: Breakthroughs in endpoint security

In our recent roundup of anti-virus programs, we discovered several new techniques being employed by anti-virus companies to make PCs safer against advanced threats.

Traditional anti-virus is dead. Long live the new and improved AV

Traditional anti-virus is dead. Long live the new and improved AV

Despite its flaws, anti-virus remains an indispensable part of endpoint security protection.

Anti-virus shootout: 7 old-school vendors show off new tricks

Anti-virus shootout: 7 old-school vendors show off new tricks

Signature-based AV a relic?Image by ShutterstockIn an era when businesses are scrambling to defend against sophisticated advanced persistent threats (APT), signature-based anti-virus may seem like a relic. But traditional anti-virus...

Old-school anti-virus vendors learn new tricks

Old-school anti-virus vendors learn new tricks

Testing reveals that traditional AV vendors have added defense-in-depth, BYOD protection.

New weapons offer hope against advanced cyber-attacks

New weapons offer hope against advanced cyber-attacks

Traffic monitoring tools from Damballa, Lancope, LightCyber can uncover hidden malware.

New tools can detect hidden malware

New tools can detect hidden malware

New tools can detect hidden malwareImage by ShutterstockWe tested new security appliances from Damballa, Lancope and LightCyber that are designed to detect the latest cyber-attacks by monitoring network traffic and identifying when a...

Hawkeye G battles malware so you don’t have to

Hawkeye G battles malware so you don’t have to

New product from Hexis Cyber Solutions automates the detection, prevention and removal of malware.

New security tools from Tenable, HP, Co3 attempt the impossible

New security tools from Tenable, HP, Co3 attempt the impossible

Automated incident response promises total network security by combining threat detection, prevention and response.

Encrypting sensitive data is a must; new key management tools make it easy

Encryption is one of the best ways to prevent the type of terrible headaches that many high-profile companies have experienced with stolen data. Even if experienced hackers are able to penetrate a system, having the data encrypted can...

IPv6 could open networks up to zero-day attacks

The National Institute of Standards and Technology (NIST) warns that moving from IPv4 to IPv6 is a process fraught with peril, which may explain why government agencies are so far behind their own deadlines for implementation.

Load More